全文获取类型
收费全文 | 1708篇 |
免费 | 159篇 |
国内免费 | 159篇 |
专业分类
电工技术 | 63篇 |
综合类 | 81篇 |
化学工业 | 15篇 |
金属工艺 | 63篇 |
机械仪表 | 79篇 |
建筑科学 | 13篇 |
矿业工程 | 12篇 |
能源动力 | 6篇 |
轻工业 | 12篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
武器工业 | 17篇 |
无线电 | 403篇 |
一般工业技术 | 36篇 |
冶金工业 | 40篇 |
原子能技术 | 10篇 |
自动化技术 | 1173篇 |
出版年
2024年 | 13篇 |
2023年 | 47篇 |
2022年 | 52篇 |
2021年 | 38篇 |
2020年 | 64篇 |
2019年 | 37篇 |
2018年 | 35篇 |
2017年 | 45篇 |
2016年 | 66篇 |
2015年 | 54篇 |
2014年 | 122篇 |
2013年 | 88篇 |
2012年 | 111篇 |
2011年 | 166篇 |
2010年 | 104篇 |
2009年 | 127篇 |
2008年 | 120篇 |
2007年 | 127篇 |
2006年 | 106篇 |
2005年 | 95篇 |
2004年 | 70篇 |
2003年 | 55篇 |
2002年 | 49篇 |
2001年 | 27篇 |
2000年 | 25篇 |
1999年 | 30篇 |
1998年 | 27篇 |
1997年 | 26篇 |
1996年 | 11篇 |
1995年 | 14篇 |
1994年 | 12篇 |
1993年 | 9篇 |
1992年 | 8篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 6篇 |
1988年 | 6篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1979年 | 1篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1975年 | 1篇 |
排序方式: 共有2026条查询结果,搜索用时 15 毫秒
1.
Intrusion Detection Networks (IDN) are distributed cyberdefense systems composed of different nodes performing local detection and filtering functions, as well as sharing information with other nodes in the IDN. The security and resilience of such cyberdefense systems are paramount, since an attacker will try to evade them or render them unusable before attacking the end systems. In this paper, we introduce a system model for IDN nodes in terms of their logical components, functions, and communication channels. This allows us to model different IDN node roles (e.g., detectors, filters, aggregators, correlators, etc.) and architectures (e.g., hierarchical, centralized, fully distributed, etc.). We then introduce a threat model that considers adversarial actions executed against particular IDN nodes, and also the propagation of such actions throughout connected nodes. Based on such models, we finally introduce a countermeasure allocation model based on a multi-objective optimization algorithm to obtain optimal allocation strategies that minimize both risk and cost. Our experimental results obtained through simulation with different IDN architectures illustrate the benefit of our framework to design and reconfigure cyberdefense systems optimally. 相似文献
2.
The present paper concerns the induction of stable sustained oscillation in feedback-linearizable single-input affine nonlinear dynamical systems via continuous-time state feedback control. The proposed application-oriented control approach is based on the conception of a state feedback controller that ensures the tracking of a limit cycle characterized in terms of the feedback-linearized system. Boundedness and convergence of the closed-loop trajectories are established following the Lyapunov theoretical framework and applying LaSalle׳s stability principle. The proposed approach is demonstrated with computer-simulated control experiments, showing that it ensures the convergence of the state trajectories of the controlled system to a designed limit cycle and that the methodology can, in principle, be applied to any single input feedback linearizable system. 相似文献
3.
4.
单片机破解的常用方法及应对策略 总被引:2,自引:0,他引:2
介绍了单片机内部密码破解的常用方法,重点说明了侵入型攻击/物理攻击方法的详细步骤,最后,从应用角度出发,提出了对付破解的几点建议。 相似文献
5.
Summary Algorithms for mutual exclusion that adapt to the current degree of contention are developed. Afilter and a leader election algorithm form the basic building blocks. The algorithms achieve system response times that are independent of the total number of processes and governed instead by the current degree of contention. The final algorithm achieves a constant amortized system response time.
Manhoi Choy was born in 1967 in Hong Kong. He received his B.Sc. in Electrical and Electronic Engineerings from the University of Hong Kong in 1989, and his M.Sc. in Computer Science from the University of California at Santa Barbara in 1991. Currently, he is working on his Ph.D. in Computer Science at the University of California at Santa Barbara. His research interests are in the areas of parallel and distributed systems, and distributed algorithms.
Ambuj K. Singh is an Assistant Professor in the Department of Computer Science at the University of California, Santa Barbara. He received a Ph.D. in Computer Science from the University of Texas at Austin in 1989, an M.S. in Computer Science from Iowa State University in 1984, and a B.Tech. from the Indian Institute of Technology at Kharagpur in 1982. His research interests are in the areas of adaptive resource allocation, concurrent program development, and distributed shared memory.A preliminary version of the paper appeared in the 12th Annual ACM Symposium on Principles of Distributed ComputingWork supported in part by NSF grants CCR-9008628 and CCR-9223094 相似文献
6.
姜智忠 《微电子学与计算机》1995,12(4):26-30
在实时控制中,数字量接口的设计是微计算机应用的一个重要问题,本文从逻辑设计的角度,讨论计算机数字量接口的设计及实现方法。 相似文献
7.
Providing definition and temporal structure for multimedia data 总被引:1,自引:0,他引:1
8.
本文分析了理想的MPEG-2信源解码器中视频、音频同步实现的关键,给出了实际的解码器中实现视频、音频同步会遇到的问题和解决的方法。实践证明,这些方法是有效的,已用于我们的MPEG-2信源解码器中。 相似文献
9.
多版本软件通过设计相异性实现了软件容错。为了对这种方法进行研究,我们的课题实现了一个三版本软件系统,称之为SFTMP(SoftwareFault-TolerantMultiProcessor)。本文描述了SFTMP的硬件结构和软件执行支持环境,该环境包括同步、表决和监控功能、版本间的通讯及故障的恢复和重构。 相似文献
10.